QUESTION 45Which protocol is used to extend Layer 2 for long-distance bridging?

A. OTVB. VXLANC. LISPD. VPNE. NvGRE

Answer: A

QUESTION 46A cloud administrator is considering deep packet inspection to secure the cloud infrastructure. Which three statements about DPI are true? (Choose three)

A. The use of DPI makes it possible to find, identify, classify, reroute, or block packets with specific data or code payloads.B. DPI does not require updates and revisions to remain optimally effective.C. DPI is an advanced method of packet filtering that functions at the application layer of the OSI.D. DPI examines only packet headers.E. DPI is essential in protecting the cloud against malicious threats such as web exploits, zeroday attacks, data exfiltration, and malware-based botnets.F. DPI can increase compute, speed because it decreases the burden on the processor.

QUESTION 52Which two options need to be considered to build a context aware infrastructure? (Choose two.)

A. VIAN segmentation (or every application type.B. The design of data formats and network protocols for the platform.C. Creating zero connectivity environments for sensitive data.D. The building of basic services in the infrastructure, including automatic path creation and proximity-based discovery.

QUESTION 55A cloud administrator is considering the appropriate solution to automate a private cloud deployment. The solution requires focus on Cisco UC5 integrated infrastructure and automating application stacks. Which solution is the most appropriate for this environment?